共 50 条
- [4] Detecting Malicious Modifications of Data in Third-Party Intellectual Property Cores 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
- [5] Trust-minimized Integration of Third-Party Intellectual Property Cores 2023 20TH INTERNATIONAL SOC DESIGN CONFERENCE, ISOCC, 2023, : 53 - 54
- [6] Protecting your intellectual property against third-party infringers and patents ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2014, 248
- [7] Third-party Relationships and Third-party Protection in the European Property Law Regulations RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
- [8] Fine Grained Confinement of Untrusted Third-Party Applications in Android 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 372 - 376
- [9] Efficient data authentication in an environment of untrusted third-party distributors 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 696 - 704
- [10] Using third-party purchasing to push third-party logistics THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404